Alltech IT Solutions Blog

Stay Ahead of Time

Stay Ahead of Time

With any luck, hearing that Microsoft is calling it quits on two of its most popular operating systems is old news. After all, Microsoft has been reminding Windows 7 users that January 14 is their end of support date, and that they really need to upgrade… but about 25 percent of Windows 7 users haven’t.

With the deadline to update looming, we wanted to provide a brief refresher on what end of support actually is, what effects it can have, and what you can do about it.

First, let’s review what the term “end of support” signifies. Out-of-support software (in our case, Windows 7) is usually completely usable - it just isn’t maintained, at all, by the developer. This includes security measures and patches. It is due to this that the out-of-support software becomes too risky to use, as any threats developed after the end-of-support date will effectively have no resistance from the software. Resultantly, the software degrades in functionality, and any computer running it can be vulnerable, and in turn, any network that the computer is a part of is also made vulnerable.

Now, there are ways to help protect your network without upgrading, but these really only apply to specific use cases. For example, you may still use a line-of-business application that only runs on Windows 7, as long as you have isolated a Windows 7 device to do so. Even then, you aren’t completely resolving your vulnerabilities, unless the device operates completely offline.

There are other, better options for you to consider.

Implement Windows 10

Personal preference aside, Windows 10 is a superior option to Windows 7, solely on the basis of its improved security. It also doesn’t require much more of your computer to run, as its minimum specifications are as such:

  • Processor - 1 GHZ or faster
  • RAM - 1 GB for 32-bit or 2 GB for 64-bit
  • Hard disk space - 16 GB for 32-bit or 20 GB for 64-bit
  • Graphics card - DirectX 9 or later with WDDM 1.0 driver
  • Display - 800 x 600 resolution

Of course, since these are the minimum specifications, this doesn’t mean you’ll have an ideal Windows 10 experience. We suggest utilizing a 2 Ghz dual-core processor, between 4 and 8 GB of RAM, and having at least 160 GB of hard drive space.

Obtaining New Hardware

Is this option cheap? It is not - but it is an inarguably effective way to make sure you are using Windows 10. You will also find that regular updates are included, but you will have to invest some time to configure everything properly.

Use ChromeOS

Instead of investing in Windows-powered devices when an employee simply doesn’t need that much capability to do their job, many businesses have outfitted their staff members with Chromebooks. Besides the initial investment to purchase these devices, it is an undeniably smaller investment than some of your other options… although you will need to factor in the cost of virtualizing your line-of-business applications, and account for the risk of Internet loss rendering your Chromebooks ineffective.

Thin Clients and Virtualization

Rather than purchasing new hardware and switching operating systems, you could always repurpose your old hardware to serve as thin clients, virtualizing your solutions. Be warned - with the deadline being so close, this may no longer be a viable option without taking significant risks.

There is also the option to use Microsoft 365. Offering Windows 10, Office 365, OneDrive with a terabyte of storage, and full security for a predictable monthly flat rate per user, Microsoft 365 serves as a solid option for your employees who primarily use productivity software.

Let the experts at Alltech IT Solutions help you make your decision. We can come up with a strategy to help you upgrade and assist you in enacting it. To learn more, reach out to us at 954-628-3770.

Some of Our Favorite MSP-Themed Memes
Tip of the Week: Upping Your Efficiency with Email


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, August 11 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Employer-Employee Relationship The Internet of Things Internet Scams Windows Live Streaming Smartphones Gmail Password Search Cost Management App Maintenance Miscellaneous Value Avoiding Downtime Bitcoin Apple Politics Hacking Employee-Employer Relationship Laptop Wireless Charging Access Control Ransomware Server Shortcut User Tips Facebook Hard Drives VoIp Data Security Hardware Staffing Google Maps Printer Managed IT IaaS Telephone Systems Tip of the week Current Events Trends Smart Technology Hosted Solutions Processors Business Copy Tactics Remote Computing Spyware Paper Reporting News Scalability disposal Fleet Management eCommerce Wi-Fi Television Marketing Multi-Factor Authentication Wearables Scam Microsoft Office Vulnerabilities Vendor Cleaning Privacy Gadgets Productivity Remote Monitoring Managed Service Phishing Memes Remote Workers Windows 10 Gaming Console Browser Virtual Reality DDoS Authentication Management Hybrid Cloud File Management Data Recovery Paste Batteries Mobile Device Knowledge Hackers Twitter Holidays Holiday Data Backup Solid State Drive National Security instant Messaging Training Net Neutrality Business Continuity Networking Paperless Office IT Support Tech Term Workers Mobility Cybercrime HIPAA Microsoft Teams Email Management Conferencing Emergency Managed IT Service Content Filtering Healthcare Collaboration Big Data Technology Tips Information Technology SSD Humor Saving Money Wireless Windows 7 Benchmarks Computers Shadow IT Business Intelligence Computer Save Money Environment Virus WannaCry Online Shopping Security Physical Security Upgrade Security Cameras Dark Data Microsoft Office 365 Cybersecurity Technology Hiring/Firing Cloud Meetings Business Management Safety Google Drive Internet of Things Streaming Media G Suite Going Green Excel Profiles Virtual Private Network HaaS iPhone Electronic Health Records Document Management Sports Mobile Devices Analytics Biometrics Google Gadget Co-Managed IT Staff IT Management Video Passwords Smartphone A.I. IT IT Support Health Network Attached Storage Budget Data Management Users Risk Management Connectivity Display Personal Information Storage Artificial Intelligence Machine Learning Worker E-Commerce Telephone System Small Business Server Management Digital PCI DSS Spam Remote Control Cabling Dongle Automation Managed Service Provider Managing Stress Movies Virtual Assistant Printers GDPR Money Compliance Office OneNote Remote Support Communications Information Data Breach CrashOverride Remote Working Backup and Disaster Recovery Payment Cards Millennials Bandwidth BDR Malware Update Virtualization Remote Monitoring and Management Recovery Applications User Tip Certification Hard Drive Managed IT Services Law Enforcement Government Network Leadership Unified Communications Cloud Computing Network Security Analysis Emoji Email User Security eWaste Threat Hacker VPN Telecommute Firewall Autocorrect Office Tips Regulations Compliance Access Freedom of Information Phone System Alert Microsoft Tech Support Office 365 Cortana Mobile Office Education Employees Internet Explorer Travel Quick Tips Telecommuting Files Spotify Blockchain Recycling Computer Care Regulation Windows 10 Entertainment Customer Relationship Management Hard Disk Drive Samsung Mobile Security Touchscreen VoIP SaaS WhatsApp Outsourced IT Tablet Licensing Project Management Website Bring Your Own Device PowerPoint Customer Service IT Services Router Business Technology Word Printing Vulnerability File Sharing Mobile Device Management Communication Two-factor Authentication Hosted Desktop Antivirus Instagram Medical IT Social Media Tip of the Week Chrome RAM Windows XP Mobile Downloads Webcam HP Lead Generation Disaster Recovery Distribution Specifications Printer Server Processor Social Network Edge Employer Employee Relationship Comparison Managed Services Provider IT budget Encryption Voice over IP Eliminating Downtime Insurance How To Unified Threat Management Outlook Hosted Solution Work/Life Balance Covid-19 Error Windows Server 2008 R2 Software Managed IT Services Proactive IT Remote Alerts Patch Management Websites Apps Voice over Internet Protocol Thank You Cables Authorization WiFi Innovation Profitability Data Protection Threats Yahoo Credit Cards Automobile Troubleshooting Scheduling Retail BYOD Company Culture Backup Telephony Battery Chrome OS Settings Productivity Taskbar Inventory Data loss Android Business Computing e-waste Congratulations Plug-In Tech Terms Payment Updates Sales Time Management Botnet Financial Vendor Management Efficiency Workplace Tips Video Games Wireless Internet Synergy Help Desk Operating System Best Practices Data Multi-Factor Security Dark Web Cryptocurrency Amazon Ink Database Remote Work Spam Blocking Human Resources